About Chris Wanamaker

This author has not yet filled in any details.
So far Chris Wanamaker has created 451 blog entries.

Google Chrome-Android syncs will revolutionize your daily life

Maximize your Android device’s potential by pairing it with Google Chrome’s powerful tools. You don’t need to manage several apps to do this — you can simply sync your Android phone with Google Chrome and have everything instantly within reach.

Send directions from your laptop to your Android phone

While Google Maps works great on smartphones, it’s often easier to use on larger screens. To send driving, walking, or commuting directions from your PC to your Android phone, do the following:

  1. Click on a specific location on Google Maps, or enter a location in the search field and click on the desired result.
  2. Click on the “Send to your phone” button in the pane on the left side of your screen.
  3. Choose to have the directions sent to your phone via text or email.

Sync your computer’s Chrome tabs with your phone

This is especially useful when you need to bring your work outside of the office. Here’s all you need to do:

  1. Open the Chrome App on […]
Google Chrome-Android syncs will revolutionize your daily life2020-07-17T08:00:00-07:00

Myth busted: Macs are NOT immune to viruses

It is common knowledge that Windows computers tend to deal with an assortment of viruses and malware, but many people fail to realize that even Macs face similar threats. As virus creators have become more adept at finding back doors and other vulnerabilities, more and more Macs have also fallen prey to malware. Here are some threats to your Mac that you should be aware of.

What are the threats that can affect your Mac?

There are several general virus types that hit Apple products, and their effects can range from merely annoying to downright destructive.

1. Adware – Adware are unwanted programs that bombard users with pop-up advertisements. Some malicious adware piggyback spyware onto their deployment protocols, which can record your typing habits with keyloggers and keyboard sniffers, as well as monitor your browsing behavior.

2. Sniffers – Sniffers are usually designed to detect certain words on a webpage and in a person’s typing pattern in order to trigger the keylogger. […]

Myth busted: Macs are NOT immune to viruses2020-07-15T08:00:48-07:00

Are your mobile devices protected?

Mobile devices are indispensable. Smartphones, tablets, and other mobile gadgets play a big part in everyday processes, especially for individuals and companies that value connection and convenience. But as the number of mobile devices used in business operations increases, so do the cyberthreats that target them. Be sure to follow these steps to safeguard company mobile devices.

Ensure mobile OS is up to date

The updates on Apple and Android operating systems (OS) improve overall user experience, but their most important function is to fix security vulnerabilities. Reduce your business’s exposure to threats by installing updates for all devices as soon as they become available. Don’t wait for a few weeks or months to update, as this gives cybercriminals ample time to exploit vulnerabilities on devices that run on an outdated OS.

Install business applications only

Downloading apps seems harmless. But lenient policies on what should and shouldn’t be downloaded on company mobile devices could lead to staff downloading and installing non-business-related apps from […]

Are your mobile devices protected?2020-07-13T08:00:52-07:00

How to choose the best VoIP system for your business

Many industries now utilize Voice over Internet Protocol (VoIP) for better communication quality and lower communication costs. Because there are many options, choosing the right solution for your business could be overwhelming. This guide will help you decide which VoIP system suits you best.

What are proprietary systems?

When most companies release VoIP software, such as Microsoft Teams or Zoom, they make it almost impossible for users to view or alter the programming code. This is to retain control over which hardware and software systems it is compatible with, and prevent hackers from exploiting vulnerabilities.

Pros and cons
One of the biggest benefits of proprietary VoIP systems is a consistent user experience across supported hardware and software. Brand-name handsets and third-party software must be programmed by the VoIP platform’s developer for compatibility, so you know everything will be optimized for a reliable user experience.

In many cases, however, the added security and polished integrations of these systems cost more than open-source alternatives.

What are […]

How to choose the best VoIP system for your business2020-07-10T08:00:06-07:00

How to protect your Microsoft 365 data

For businesses, data security is critical. The loss or theft of information could lead to crippling financial losses, legal disputes, and loss of customer trust. While Microsoft 365 comes with some security and compliance tools, it still needs the support of data protection best practices. Here’s what you need to do.

Take advantage of policy alerts

Establishing policy notifications in Microsoft 365’s Compliance Center can help you meet your company’s data security obligations. For instance, policy tips can pop up to warn employees about sending confidential information anytime they’re about to send messages to contacts who aren’t listed in the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices.

Secure mobile devices

Since personal smartphones and tablets are often used to access work email, calendar, contacts, and documents, securing them should be a critical part of protecting your organization’s data. Installing mobile device management features for Microsoft 365 enables you to manage security policies and access permissions/restrictions, and remotely wipe sensitive data […]

How to protect your Microsoft 365 data2020-07-09T10:30:20-07:00

What private browsing can and can’t do

As you surf the web, it’s nearly impossible to keep your internet activity completely private. Certain websites collect personal information for marketing purposes and your browser keeps track of all the websites you visit. That browsing information can also fall into the wrong hands, which is why you should consider using private browsing if you want to keep your online activities to yourself.

What is private browsing?

Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — remembers the URLs of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — […]

What private browsing can and can’t do2020-07-09T10:31:46-07:00

Here’s how you can wow website visitors

Much like how we’re turned off by professionals who look disheveled, we leave websites that look ugly and messy. Follow our tips to get your website cleaned up nicely and make it ready to convert customers.

Make a statement with professional photographs

Before site visitors read what’s on your website, they assess it by checking out your images. A picture is indeed worth a thousand words, but are those words truly what you want to convey to your audience?

Blurry, outdated, or irrelevant pictures tell your site visitors that you don’t care about their browsing experience. In-house photos are the best option, but stock images shouldn’t cause any problems as long as they are optimized for mobile viewing and relevant to your content.

Help visitors find what they want with search tools

If your set of offerings is not expansive, a simple navigation menu ought to help visitors find what they need. However, the deeper your catalog gets, the more you’ll need additional tools. One way is to affix a search bar in […]

Here’s how you can wow website visitors2020-07-03T08:00:57-07:00

Ensure your privacy in Windows 10

Windows 10 helps users by giving useful suggestions as they type and by displaying ads based on their online searches. But these can feel invasive after a while. To ensure your privacy and keep Microsoft’s watchful eye off your computer activity, follow these tips.

Turn off personalized advertising

Windows 10 assigns each user an advertising ID to personalize their ad experience based on their recent browser history. You can turn off the advertising ID feature by doing the following:

  1. Click Start > Settings > Privacy > General.
  2. Toggle off the option “Let apps use my advertising ID for experiences across apps.” This will reset your advertising ID.
  3. If you don’t want to receive locally relevant content from websites, toggle off the option “Let websites provide locally relevant content by accessing my language list.”

Disable Cortana

Microsoft has ventured into the market of voice-controlled virtual assistants with Cortana. This personal assistant allows users to set reminders, schedule events, and send emails, among other tasks. Every time you use Cortana, it collects information […]

Ensure your privacy in Windows 102020-07-09T10:41:14-07:00

Guidelines on monitoring your employees’ online activities

There are advantages and disadvantages to monitoring your employees’ online behavior. Below is an honest and transparent list of arguments for and against such a practice. However, should you decide to monitor your employees, we have some guidelines for you to follow for a smooth implementation process.

The case for monitoring

Here are several reasons why monitoring your employees’ activities on company devices is a good idea. It can help you:

  • Protect your organization from data theft or harm – because careless or disgruntled employees may leak or steal your data.
  • Ensure you have a harassment-free workplace – because cyberharassment (sexual or otherwise) happens among employees.
  • Ensure members of your staff comply with policies – such as not downloading illegal programs or spending time on websites with illegal or hostile content.
  • Provide evidence in case of a lawsuit – should an employee participate in illegal activities using your business’s computers (heaven forbid!), monitoring their device can provide evidence of their involvement.

Sadly, many business owners who monitor their employees often […]

Guidelines on monitoring your employees’ online activities2020-07-09T10:40:58-07:00

How to prevent healthcare data breaches

Cloud-based healthcare systems have vastly improved medical services. Digitization has allowed hospitals and clinics to provide better patient care and greater accessibility to information. However, it has also increased the risk of personal health information (PHI) cybertheft. For this reason, healthcare cybersecurity experts are working harder than ever to protect PHI.

From financial information to medical information

In the past few years, cybercriminals have focused on stealing financial data, including credit card numbers, online banking credentials, and other personal information. But things are taking a turn, with financial institutions fortifying their database security and raising client awareness on the growing problems.

Stronger data protection measures in the financial industry have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes date of birth, medical and physical records, and social security number — information that can’t be easily reset, and is significantly more valuable than credit card data.

Securing healthcare data

Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take […]

How to prevent healthcare data breaches2020-06-26T08:00:29-07:00
Go to Top